CPENT eBook w/ iLabs (Volumes 1 through 4)
Important Discount Information:
Extensive discounts are offered through the EC-Council Academia partner program to students and faculty within the network. In result, this item is available at the following rate to qualified students:
$417.50
___
Access the authorized lab and eBook resources for Certified Penetration Testing Professional (CPENT), developed and authored by EC-Council! (www.eccouncil.org)
This license will provide you with 6 months access to EC-Council's exclusive iLabs portal (access starts post code redemption), and 12 months access to CPENTv1 Volumes 1 through 4 via Vital Source. Practice your skills, refine your skills, follow the instructions, or go outside of the instructions. These are NOT simulations and this is one range you will never break!
(Average Time for Course Completion: 10 Hours)
CPENTv1 - Volumes 1 through 4 Course Outline:
- Introduction to Penetration Testing and Methodologies *NO LAB OFFERED
- Penetration Testing Scoping and Engagement Methodology
- Report Writing and Post Testing Actions
- Open Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing Methodology
- Web Application Penetration Testing Methodology *NO LAB OFFERED
- Binary Analysis and Exploitation *NO LAB OFFERED
- Network Penetration Testing Methodology – External
- Network Penetration Testing Methodology – Internal
- Network Penetration Testing Methodology - Perimeter Devices
- Wireless Penetration Testing Methodology *NO LAB OFFERED
- IoT Penetration Testing Methodology
- OT/SCADA Penetration Testing Methodology
- Cloud Penetration Testing Methodology Appendix *NO LAB OFFERED
- Appendix B – Fuzzing
- Appendix C – Mastering Metasploit Framework
- Appendix D – PowerShell Scripting
- Appendix E – Bash Environment and Scripting
- Appendix F – Python Environment and Scripting
- Appendix G – Perl Environment and Scripting
- Appendix H – Ruby Environment and Scripting
- Appendix I – Active Directory Penetration Testing
- Appendix J – Database Penetration Testing
- Appendix K – Mobile Device Penetration Testing